This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
Abstract. Thanks to the immense potential cooperative communications displays, extensive investigations have been directed to examine its performance by means of both analysis and ...
Thanasis Korakis, Zhifeng Tao, Salik Makda, Boris ...
Abstract. Different auction-based approaches have been used to allocate resources in Grids, but none of them provide the design choice for a specific economic model while consideri...
In distributed real-time systems, meeting the real-time constraints is mandatory but the satisfaction of other application-dependent criteria is most generally required as well. I...
Several architectures have been recently proposed to support IP mobility. Most studies, however, show that current protocols, in general, fall short from satisfying the performanc...